Chapter 7&8

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A technician wants to configure a DHCP server to guarantee that certain printers always receive the same address. Which of the following should te technician configure?

Address Reservation

Vishalini rented a small office to offer bookkeeping services. She needs DHCP, wired, wireless ad file sharing capabilities, as well as a switch to connect three computers. However, her technology budget is limited. How can she obtain access to all these capabilities at a modest cost?

Buy a multifunction router.

A technician is working at a liens office after hours and needs to finish the work but does not have immediate access to prebuilt cables. One cable needed is for a dial up connection from the dial up modem to the existing analog POTS jack on the wall. The technician has the necessary wire and connectors to make the cables. Which of the following tools will the technician use to make the cables and then verify that they both work properly.

Cable Tester. Crimper. Cable Stripper.

You recently bought s more router, modem and switch to create a wired network at home containing six computers. Beginning with the computers, How would you connect the devices to ensure the computers have internet access?

Computers, switch, router, modem.

Adelina works at an online retail company where weekend sales spike and generate increased network traffic. She is sued to investigate options to help alleviate network congestion inexpensively. Which solution will help mitigate the problem with relative ease?

Configure VLANs

A small company has a few users that are spending too much time on specific social media websites; this is affecting their productivity at work. The manager asks if it is possible to limit access to those sites.

Configure a proxy server as an internet appliance to limit access to the websites.

Quintavius loves to tinker with computers so he sets off to see how many networking services he can install in one physical server. He sets up the system to support DHCP,DNS,HTTP,HTTPs,Telnet,SSH and an email server. On what part will these services listen?

DHCP 67, DNS 53, HTTPS 443, Telnet 23, SSH 22, SMTP 25.

You are a security professional tasked with preventing fraudulent emails. Which DNS record records will you configure to help you realize this goal?

DKIM. SPF

Which of the following devices are most commonly used to connect a LAN to an ISP for broadband services?

DLS MODEM. CABLE MODEM.

You are setting up your windows computer to connect to the Internet. When you type www.microsoft.com, the issues an error message indicating the site cannot be reached. what network setting should you check to see the address of the server being used to resolve he domain name you entered in the browser?

DNS

Gulliver is trying to determine why one of the computers at work cannot connect to the network. He thinks it might be the DHCP related but wants to t rule out the computer itself as being the problem. Manually configures the network settings that will allow the computer to connect to the network. What three values does he configure.

Default Gateway. IP address. Subnet Mask.

A technician is configuring a new SOHO multifunction router at a customer site to provide network access to several wireless devices. The technician is requires to protect the internal network from unauthorized access while performing the initial router setup as well as during normal operation after the configuration is completed. Which of the following is the best step from he technician to take in securing the router to met this requirement?

Enable DHCP on the router and configure IPaddress reservations for the wireless clients.

You buy a cable that has RJ -45 connectors. For what type of transmission will the cable be used?

Ethernet.

A geospatial company uses LRFW networks because it allows them to transmit signals across large distances that can sometimes exceed 100 miles. What features of LRFW enable this capability?

High power transmission. Highly directional antennas.

To reduce costs, a company wants to slowly transition and eventually eliminate their dependency on their own data center , and IP personnel tp manage the data center. What would you initially recommend?

Hybrid could services.

You are tasked with securing a network for a client that requires a spam gateway, VPN, antimalware as well as an endpoint management system. Which of the following would best help you meet the requirements of the client?

Implement a UTM appliance.

Your company is experiencing an increase in malware incidents, your manager is asking for advice on how best to verify that company owned workstations are up to date with security patches, anti malware requirements, nd software application updates. The manager is also concerned that employee owned devices connecting to the corporate LAN have the same level of security as the company devices. Which of the following protections and services should you recommend?

Implement and endpoint management server appliance.

The owner of a small loan brokerage firm does not know much about computers but has always been concerned with security, so he buys a used enterprise grade router. Mango, a loan officer with a little bit of IT knowledge, configures FE80::1 as the only address on the internal interface of the router. What effect will this have?

Internet access will now be suppressed.

Mr Sales knocks on your door and tries t sell you a faucet with the ability to notify you through your cell phone if it springs a leak. What technology enables this capacity?

IoT

A coworker is asking for your advice on a problem with a computer that will not communicate on the network. While assisting the coworker, you suspect that the wired NIC may have failed. Which of the following will you recommend yo your coworker as the best tool to diagnose this issue?

Loopback plug.

You run the ipconfig /all command on your Windows computer and see a a hexadecimal value that looks like this : E0-70-EA-4E-AB-A5.

MAC Address. Physical Address.

Jana is an independent software developer looking for a cloud model that will allow her to easily and quickly provision computing resources, test her application, then release the computing resources when done. Which model should Jana use?

PaaS.

You're running a performance test using three different browsers on the same computer to simultaneously access the same web site. What numeric identifier or address is used to keep the three connections separate at the application (browser) level?

Port number.

Online activity for a retail company rises dramatically in November and December. Which cloud computing feature allows them to automatically scale up or down their computing resources to meet demand?

Rapid Elasticity.

Kwan 5th grade teacher, has been learning about computers but does not know much about networking. He found a hub in the supply closet and decided to. Create a small network in his classroom consist of a dile/application server, 10 relatively new computes and a printer. The students often complain that the computers are slow, but one student blames it on the network. What can Kwan do to eliminate complains?

Replace the hub with a switch.

Which of the following is a function of an endpoint management server appliance?

Restricting a device's access to the network until security requirements are met.

A large corporation needs a high-speed network to test a product that will backup an restore terabytes fo data. What type of network should they use?

SAN.

You are completing a networking assignment and need to connect devices as shown in the schematic. Computer PCI connects to switch SI. SI connects to router R1, R1 connects to router R2. R2 connects to switch S2 which connects to computer PC2. None of the devices support auto-linking .

ST, ST, XO, ST, ST.

Jochi just started college and is using an online LMS to gain access to his assignments. From his perspective, what type of cloud service does te LMS represent?

SaaS.

Venus is a member of the IT department at a company that has a moderately sized network. One of her performance review objectives is to help her department be more proactive relative to being notified and responding to certain events that occur in the network. What type of server will help her meet the objective

Syslog Server

Jesenia read an article that said stored data, such as when you are downloading an app, is transmitted using TCP, but live-streaming events are transmitted using UDP. Why would this be true.

TCP is reliable and ensures the delivery of data using a connection oriented mechanism. UDP is fast and does not retransmit lost data so as not to disrupt the live video feed.

You want to setup a separate network at home that is accessible from the internet. You want it to be isolated from your personal network, so you lease an IPv6 address from the ISP. When you configure the interface IDs of the devices on the network, which in the IPv6 address will you be modifying?

The last 64bits of the following IPv6 address.

What characteristics do the 10.0.0.1/24, 172.16.0.2/24, and 192.168.0.3/24 IP addresses have in common?

They are not routable by the ISP. They are private IP addresses. They all have the same subnet mask.

A technician has verified that a bad Cat6 cable run in the wall is responsible for a workstation lack of communication on the network. Which of the following tools can be used to pinpoint te location of the cable inside the wall?

Toner probe.

Nikita attempts to install a hypervisor on her laptop. When she tries to create a virtual machine an error message suggests that virtualization is not supported. Where can she check to see if virtualization is enabled?

UEFI/BIOS.

Ibrahim is a computer teacher at a large high school with an 802.11. Wireless network. They ask him to run a 1Gbps Ethernet cable from a switch to a computer that happens to be 150 meters away. How should he best proceed?

Use two 75 meter long cables with a switch in between.

Abigail need to mode out of state to take care of her mother. She will need secure remote access to continue working as a cloud engineer. Wat type of connection does Abigail need to securely access the computing resources at her company?

VPN.

You just completed a contact up the network in a new 10 story office building for a commercial airline company. The are not happy with their VoIP service. You troubleshoot and determine you need to modify the QoS policies. Which type of traffic should have the highest priority?

Voice.

In which of the following situations should you install an IPS instead o an IDS?

You want to block unauthorized activity on your LAN from the internet.

You are sued to add a resource record in the DNS namespace for a website your company wants to publish. Which of the following entries will you make?

www.company.com A IN 14440 209.165.200.5


Set pelajaran terkait

HST 130 Rogers Final Exam Study Guide

View Set

PSPO 1 - Scrum.org Question Bank

View Set

Chapter 9: Production and Operations Management

View Set

Parathyroid hormone and Vitamin D

View Set

Encountering the Old Testament, Chapter 1

View Set